get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.1/patches/2224959/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2224959,
    "url": "http://patchwork.ozlabs.org/api/1.1/patches/2224959/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260420030532.2541-5-zixing.liu@canonical.com/",
    "project": {
        "id": 15,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/15/?format=api",
        "name": "Ubuntu Kernel",
        "link_name": "ubuntu-kernel",
        "list_id": "kernel-team.lists.ubuntu.com",
        "list_email": "kernel-team@lists.ubuntu.com",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null
    },
    "msgid": "<20260420030532.2541-5-zixing.liu@canonical.com>",
    "date": "2026-04-20T03:05:32",
    "name": "[SRU,J/N:linux,4/4] selftests/powerpc: Detect taint change in mitigation patching test",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "24e72f380338fc6e4965159ea1d79524e42254c3",
    "submitter": {
        "id": 90901,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/90901/?format=api",
        "name": "Zixing Liu",
        "email": "zixing.liu@canonical.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/20260420030532.2541-5-zixing.liu@canonical.com/mbox/",
    "series": [
        {
            "id": 500544,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/500544/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=500544",
            "date": "2026-04-20T03:05:28",
            "name": "Backport upstream patches for powerpc kselftests",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/500544/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2224959/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2224959/checks/",
    "tags": {},
    "headers": {
        "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n unprotected) header.d=canonical.com header.i=@canonical.com\n header.a=rsa-sha256 header.s=20251003 header.b=JvVV/uYI;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ubuntu.com\n (client-ip=185.125.189.65; helo=lists.ubuntu.com;\n envelope-from=kernel-team-bounces@lists.ubuntu.com;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from lists.ubuntu.com (lists.ubuntu.com [185.125.189.65])\n\t(using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzVkC0848z1yHr\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 13:06:10 +1000 (AEST)",
            "from localhost ([127.0.0.1] helo=lists.ubuntu.com)\n\tby lists.ubuntu.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1wEexW-00036n-Fi; Mon, 20 Apr 2026 03:06:02 +0000",
            "from smtp-relay-internal-0.internal ([10.131.114.225]\n helo=smtp-relay-internal-0.canonical.com)\n by lists.ubuntu.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128)\n (Exim 4.86_2) (envelope-from <zixing.liu@canonical.com>)\n id 1wEexV-00035G-3s\n for kernel-team@lists.ubuntu.com; Mon, 20 Apr 2026 03:06:01 +0000",
            "from mail-pf1-f199.google.com (mail-pf1-f199.google.com\n [209.85.210.199])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id F07693F129\n for <kernel-team@lists.ubuntu.com>; Mon, 20 Apr 2026 03:06:00 +0000 (UTC)",
            "by mail-pf1-f199.google.com with SMTP id\n d2e1a72fcca58-82f896eb6faso2725210b3a.3\n for <kernel-team@lists.ubuntu.com>; Sun, 19 Apr 2026 20:06:00 -0700 (PDT)",
            "from liushuyu-p15.lan ([2409:8a4c:d2:9640:4913:801d:a666:ddeb])\n by smtp.gmail.com with ESMTPSA id\n d2e1a72fcca58-82f8e981a0asm9222145b3a.3.2026.04.19.20.05.57\n for <kernel-team@lists.ubuntu.com>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sun, 19 Apr 2026 20:05:58 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com;\n s=20251003; t=1776654360;\n bh=Mv9pkMeb0+L7SZX1bJes4JN+/aUYgEio+pZUF1+lmO8=;\n h=From:To:Subject:Date:Message-ID:In-Reply-To:References:\n MIME-Version;\n b=JvVV/uYIUmDvrvTAdpiUUrdHpXWyFyogZwO+jGt1IgUZJmtJ+Ma/uEZLZYD0dk/WU\n J5YOtzWI5rR3aaqCV6dVPzhBAD+hEHmLzYXxBbUtoBQFknsseuYTYrFpCZrKEXS4rT\n VJ4rbaZYhq4v6OTehCdlPJEn1prSdUtI0k3JAPompcxynLRsBbmp+tYDlv3OwN42+S\n PoKv0Y9/giFRLD5Xhi2RkAVKP7w8941TejuJWaXV2XdHxOf0GH1Z74CJddIclm1GI4\n lYxyN4uL4w+SCs05zCg362G44CiDMLVaXqzOD2UZIuuuCsb8veszdFtjJ8qMU9vcn5\n zu9EG5OfrvMEwF8bf0Jcf3eyI62UlXLNFSHzLmM78d+eGFB4wnxjYJ0QzXqL4NGwBg\n 5x+sfS4AQYMel6Y7M9W4e1JmAGUyjHT/fn00v1Arzzpu4aTsNrPnHQ3QnrLM4z2ENA\n EZcpIRgN6bymvjdfIqqOOLvQ1up2Dg1cbHwiGsSFwOZl2oKEdR0bKLD7//o6iKJKgs\n 9Vd3xW+oBqo2ByrqgenfMV15nTPvHupEeIDIDX6dO0/l6CSwq/BsWUHQ/V0hLpxalU\n jbexN6+Iga0Ly8bJS73AXm9/cS6ORuRG/uqWycCNUgSpWXvIr6sdRUdIYj29TjYtTI\n bOSM0W2x5tgToZNuKIV/6R98=",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776654359; x=1777259159;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=Mv9pkMeb0+L7SZX1bJes4JN+/aUYgEio+pZUF1+lmO8=;\n b=Jg5WY/bReHb1Ss9951dRQWCiFtPlz2VR3DfY3rhSOvIdwX/lNptIIHFQ7gjDnchhuR\n yTDoDo5Wk0nATFw+4AbJw8HO0ndcR2b5ejOZYrieEWT6T2sWvpkmpGXnB7kBMm3PO/tm\n QX0VbqplXmydD96dbEwDvzj6ARxwIwBaQ+eImg5mZwyBVFMxs66CJJTng0joDo5f8rEM\n nAUGGwFpmeH4Plo0WZWMvA3GgzZD0C+19ajsp1MYG2BU8IltRKFhU4yfFn35BxF9Pp7Q\n xWjEsRyLHeIntfcKKXKL05cjzDQZ3qB/i2OjCm+/NlVnXt9Q832JGSsrlH6j5NEx8juu\n +66Q==",
        "X-Gm-Message-State": "AOJu0YzZ9Jcc4w9u8hJfNfrapRg4+5jHtoiNcreAOr9x5AhLny0x34Kh\n uoCBMlfIrJCV9S9m6x58QXCkC/0iYQE0xCkLWSUbQal0WqbCeQX+hQDTsVY4yAFvC1mQcAOBwxu\n NmrPguDc5s1DBeLUwvC75DQR3+A64TabPTnu05nOrc8XNe54C6crF/g9KpnomzA8o/+kQ/Hg/Va\n +Fxp1rn+Eh7BF2TIUwFhI=",
        "X-Gm-Gg": "AeBDieuorM9/jPBxmcc6s9wpomvGaRthu4bl6nr9m3mDFzrutcXGw2b6JsWt48i+nVN\n QSp0UdMhAT7UsXE8Cs8zdzb9hmt67ajv8B4LF3z/vOmA6enfPdXB+j5lY6S0axSeRFVNMaVT3Ex\n AfRZB0ai8IpjhdeMBFr514MQzHw6W9t5G8LChIFXwz/IjdOlAO+HsuN315puaSGvIO/809EFQE2\n zpLoB3keNgg2LkRYAscBCxXULZjgvTKlHJm3beriYTIB79iwfjwCcpnlWSXnMTDZZuPjUNFJt5b\n LAiTQr9kjhLHMl6Qu8t2icDm4eVKlnihJBs3zjAk+T40c42QitTcWjZZg9ydu0O+tsey1r/PhRn\n U2CGeSVl/5SsS9qTTsSHZ+xZxvBzBmJCCp7J/iEwxuwF7I5o=",
        "X-Received": [
            "by 2002:a05:6a00:e1a:b0:82f:5e92:c642 with SMTP id\n d2e1a72fcca58-82f8c90d15fmr12650494b3a.41.1776654359306;\n Sun, 19 Apr 2026 20:05:59 -0700 (PDT)",
            "by 2002:a05:6a00:e1a:b0:82f:5e92:c642 with SMTP id\n d2e1a72fcca58-82f8c90d15fmr12650465b3a.41.1776654358891;\n Sun, 19 Apr 2026 20:05:58 -0700 (PDT)"
        ],
        "From": "Zixing Liu <zixing.liu@canonical.com>",
        "To": "kernel-team@lists.ubuntu.com",
        "Subject": "[SRU][J/N:linux][PATCH 4/4] selftests/powerpc: Detect taint change in\n mitigation patching test",
        "Date": "Mon, 20 Apr 2026 11:05:32 +0800",
        "Message-ID": "<20260420030532.2541-5-zixing.liu@canonical.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260420030532.2541-1-zixing.liu@canonical.com>",
        "References": "<20260420030532.2541-1-zixing.liu@canonical.com>",
        "MIME-Version": "1.0",
        "X-BeenThere": "kernel-team@lists.ubuntu.com",
        "X-Mailman-Version": "2.1.20",
        "Precedence": "list",
        "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>",
        "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>",
        "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>",
        "List-Post": "<mailto:kernel-team@lists.ubuntu.com>",
        "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>",
        "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n <mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "Content-Transfer-Encoding": "base64",
        "Errors-To": "kernel-team-bounces@lists.ubuntu.com",
        "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>"
    },
    "content": "From: Michael Ellerman <mpe@ellerman.id.au>\n\nCurrently the mitigation patching test errors out if the kernel is\ntainted prior to the test running.\n\nThat causes the test to fail unnecessarily if some other test has caused\nthe kernel to be tainted, or if a proprietary or force module is loaded\nfor example.\n\nInstead just warn if the kernel is tainted to begin with, and only\nreport a change in the taint state as an error in the test.\n\nSigned-off-by: Michael Ellerman <mpe@ellerman.id.au>\n---\n .../selftests/powerpc/security/mitigation-patching.sh     | 8 ++++----\n 1 file changed, 4 insertions(+), 4 deletions(-)",
    "diff": "diff --git a/tools/testing/selftests/powerpc/security/mitigation-patching.sh b/tools/testing/selftests/powerpc/security/mitigation-patching.sh\nindex 00197acb7ff1..971793e93ba9 100755\n--- a/tools/testing/selftests/powerpc/security/mitigation-patching.sh\n+++ b/tools/testing/selftests/powerpc/security/mitigation-patching.sh\n@@ -36,8 +36,7 @@ fi\n \n tainted=$(cat /proc/sys/kernel/tainted)\n if [[ \"$tainted\" -ne 0 ]]; then\n-    echo \"Error: kernel already tainted!\" >&2\n-    exit 1\n+    echo \"Warning: kernel already tainted! ($tainted)\" >&2\n fi\n \n mitigations=\"barrier_nospec stf_barrier count_cache_flush rfi_flush entry_flush uaccess_flush\"\n@@ -65,9 +64,10 @@ fi\n echo \"Waiting for timeout ...\"\n wait\n \n+orig_tainted=$tainted\n tainted=$(cat /proc/sys/kernel/tainted)\n-if [[ \"$tainted\" -ne 0 ]]; then\n-    echo \"Error: kernel became tainted!\" >&2\n+if [[ \"$tainted\" != \"$orig_tainted\" ]]; then\n+    echo \"Error: kernel newly tainted, before ($orig_tainted) after ($tainted)\" >&2\n     exit 1\n fi\n \n",
    "prefixes": [
        "SRU",
        "J/N:linux",
        "4/4"
    ]
}